Wednesday, 22 October 2014

Startpage search engine The POODLE SSLv3 Threat

Startpage have announced an advisory claiming that Because StartPage does not support SSL v3, you are safe from POODLE when visiting StartPage.com.Readers may conclude that resetting all search engine home pages to Startpage will be an added measure to protect against Poodle.

https://support.startpage.com/index.php?/Knowledgebase/Article/View/980/0/the-poodle-sslv3-threat


 see also https://unixpackages.com/

Thursday, 16 October 2014

SSL heartbeat and poodle flaws in Firer Fox browsers security commentry

Firer Fox has released an add on for users of sslv3 to help secure their machines.Its easy and comes by way of add on this is the statement.Newer releases will incorporate security upgrades.

SSLv3 is now insecure, and is soon going to be disabled by default.
https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/

In the meantime, you can use this extension to turn off SSLv3 in your copy of Firefox. When you install the add-on, it will set the minimum TLS version to TLS 1.0 (disabling SSLv3). If you want to change that setting later, like if you really need to access an SSLv3 site, just go to Tools / Add-ons and click the "Preferences" button next to the add-on. That will give you a drop-down menu to select the minimum TLS version you want to allow.

As of version 0.2, this add-on should work with all Mozilla products, including Firefox, Firefox for Android, Thunderbird, and Seamonkey.

Friday, 10 October 2014

OiOS Openindiana SSL Heartbleed bug security comment

OiOS Openindiana Open SSL has released a beta release of patched SSL

25-Sep-2014:     Beta 3 of OpenSSL 1.0.2 is now available, please   test it now https://www.openssl.org/

OiOS Openindiana Bash Security Comment

'The Register'  recently announced A bug discovered in the widely used Bash command interpreter poses a critical security risk to OS X MACs,Unix and Linux systems – and, thanks to their ubiquity, the internet at large.
It lands countless websites, servers, PCs, OS X Macs, various home routers, and more, in danger of hijacking by hackers.It puts Apache web servers, in particular, at risk of compromise: CGI scripts that use or invoke Bash in any way – including any child processes spawned by the scripts – are vulnerable to remote-code injection. OpenSSH and some DHCP clients are also affected on machines that use Bash.

The National Vulnerability Database detailed the following issues
CVE-2014-6278
Summary: GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.
Published: 9/30/2014 6:55:04 AM
CVSS Severity: 10.0 HIGH

References
http://www.opencsw.org/packages/CSWbash/
http://tiswww.case.edu/php/chet/bash/bashtop.html
http://www.theregister.co.uk/2014/09/24/bash_shell_vuln/
http://web.nvd.nist.gov/view/vuln/search-results?query=bash&search_type=all&cves=on
http://www.openssh.com/
http://www.isc.org/downloads/software-support-policy/security-advisory/

Consensus opinion on new media at this time: where the system is exposed to such risk (you are using bash shell) update bash to the latest version,download the patched updates when they become available.Mitigate risk with internal,external operational audit and risk assessment.
http://ftp.gnu.org/gnu/bash/bash-4.3-patches/

Using Apache servers

 http://security.stackexchange.com/questions/68146/how-do-i-secure-apache-against-the-bash-shellshock-vulnerability

Blogs and websites

http://www.symantec.com/connect/blogs/shellshock-all-you-need-know-about-bash-bug-vulnerability
http://tools.cisco.com/security/center/viewAlert.x?alertId=35845